SlideShare a Scribd company logo
1 of 21
© 2013 IBM Corporation
IBM Security Systems
1 IBM Security Systems © 2013 IBM Corporation
Security Intelligence with Big Data
IBM Security Systems
Stefaan Van daele
Senior Security Architect
March 2013
© 2013 IBM Corporation
IBM Security Systems
2 IBM Security Systems
Infiltrating a trusted partner and then loading
malware onto the target’s network
Creating designer malware tailored to only infect
the target organization, preventing identification
by security vendors
Using social networking and social engineering to
perform reconnaissance on spear-phishing
targets, leading to compromised hosts and
accounts
Exploiting zero-day vulnerabilities to gain access
to data, applications, systems, and endpoints
Communicating over accepted channels such as
port 80 to exfiltrate data from the organization
Well-organized attackers and malicious insiders are successfully
bypassing security defenses
Designer Malware Backdoors
Spear Phishing Persistence
Escalating Motives and Sophistication
 Organized Crime
 Espionage and Hacktivists
 Nation-state Actors
© 2013 IBM Corporation
IBM Security Systems
3 IBM Security Systems
Customers have a growing need to identify and protect against
threats by building insights from broader data sets
Logs
Events Alerts
Configuration
information
System
audit trails
External threat
intelligence feeds
Network flows
and anomalies
Identity
context
Web page
text
Full packet and
DNS captures
E-mail and
social activity
Business
process data
Customer
transactions
Traditional Security
Operations and
Technology
Big Data
Analytics
New Considerations
Collection, Storage
and Processing
 Collection and integration
 Size and speed
 Enrichment and correlation
Analytics and Workflow
 Visualization
 Unstructured analysis
 Learning and prediction
 Customization
 Sharing and export
© 2013 IBM Corporation
IBM Security Systems
4 IBM Security Systems
Big Data Warehouse
Big Data
Platform
Analytics and Forensics
Security Intelligence
Platform
Real-time Processing
Security Operations
Integrated analytics and exploration in a new architecture
• Real-time data correlation
• Anomaly detection
• Event and flow normalization
• Security context and enrichment
• Distributed architecture
• Long-term, multi-PB storage
• Unstructured and structured
• Distributed Hadoop infrastructure
• Preservation of raw data
• Enterprise integration
• Pre-defined rules and reports
• Offense scoring and prioritization
• Activity and event graphing
• Compliance reporting
• Workflow management
• Advanced visuals and interaction
• Predictive and decision modeling
• Ad hoc queries
• Interactive visualizations
• Collaborative sharing tools
• Pluggable, intuitive UI
Structured,
analytical,
repeatable
Creative,
exploratory,
intuitive
Integrated
IBM
Solution
© 2013 IBM Corporation
IBM Security Systems
5 IBM Security Systems
What’s Next? Solving new security challenges with expanded
Big Data analytics capabilities
What customers are telling us:
1. Analyze a variety of non-
traditional and unstructured
datasets - such as email, web
content, files and full packets
2. Significantly increase the
volume of data stored for
forensics and historic analysis
3. Visualize data in new ways,
using custom queries,
graphs, linguistics, maps, etc.
4. Integrate this capability with
my current security operations
IBM Security QRadar
• Data collection and
enrichment
• Event correlation
• Real-time analytics
• Offense prioritization
Advanced Threat Detection
Traditional data sources
Security Intelligence Platform
© 2013 IBM Corporation
IBM Security Systems
6 IBM Security Systems
Real-time
streaming
Insights
IBM Security QRadar
• Hadoop-based
• Enterprise-grade
• Any data / volume
• Data mining
• Ad hoc analytics
• Data collection and
enrichment
• Event correlation
• Real-time analytics
• Offense prioritization
Big Data Platform
Custom Analytics
Traditional data sources
IBM InfoSphere BigInsights
Non-traditional
Security Intelligence Platform
How? By integrating QRadar with IBM’s Hadoop-based offering
Advanced Threat Detection
© 2013 IBM Corporation
IBM Security Systems
7 IBM Security Systems
QRadar leverages big data today to identify security threats
IBM QRadar Security Intelligence Capabilities Customer Impact
Powerful appliances with massive scale  Insights from 1000s of devices, spanning 100s of TBs
Payload indexing and Google-like searching of big data  Rapid ad hoc query - search 7M+ events in <0.2 sec
Broader data analysis: logs, flows, identities, vuln’s, threats  Greater insight and detection from richer context
Layer 7 network flow collection and analytics  More accurate anomaly detection and easier forensics
Advanced threat visualization and impact analysis  Attack path visualization and device / interface mapping
Enrichment with X-Force® intelligence and external feeds  Increased accuracy of detecting the latest threats
High-
Volume
Events,
Flows and
Context
© 2013 IBM Corporation
IBM Security Systems
8 IBM Security Systems
Example QRadar uses cases
Behavior
monitoring
and flow
analytics
Activity and
data access
monitoring
Stealthy
malware
detection
Irrefutable Botnet
Communication
Layer 7 flow data shows botnet
command and control
instructions
Improved
Breach Detection
360-degree visibility helps
distinguish true breaches from
benign activity, in real-time
Network Traffic
Doesn’t Lie
Attackers can stop logging and
erase their tracks, but can’t cut
off the network (flow data)
© 2013 IBM Corporation
IBM Security Systems
9 IBM Security Systems
9
IBM InfoSphere BigInsights – A flexible, enterprise-class solution for
processing large volumes of data
EnterpriseValue
Core
Hadoop
BigInsights Basic
Edition
BigInsights Enterprise Edition
Free download with web support
Limit to <= 10 TB of data
(Optional: 24x7 paid support
Fixed Term License)
Professional Services Offerings
QuickStart, Bootcamp, Education, Custom Development
Enterprise-grade features
Tiered terabyte-based pricing
Easy installation
and programming
• Analytics tooling / visualization
• Recoverability security
• Administration tooling
• Development tooling
• Flexible storage
• High availability
© 2013 IBM Corporation
IBM Security Systems
10 IBM Security Systems
Web and
Email Proxy
Customer example – User profiling based on multiple sources
NetFlow
Optional
Relational Store
Unstructured Data
5
1
1
10
9
8
6
2
Hadoop Store
Big Data
Warehouse
Big Data Analytics
and Forensics
Data Sources Real-time Processing Security Operations
3
7
Suspicious
User(s)
Internet 4
1. NetFlow and logs sent to QRadar
2. Event and flow processing
3. Correlation against external feeds
4. Real-time user alerts to SOC
5. Unstructured data to BigInsights
6. Enriched events and flows sent to BigInsights
7. Spreadsheet UI for business analysts (BigSheets)
8. Post-processed data storage
9. i2 Analyst Notebook: link-based visuals and
analytics
10. Update of QRadar real-time rule sets
© 2013 IBM Corporation
IBM Security Systems
11 IBM Security Systems
Example Use Case: Spear-phishing analysis
ATTACKER
User receives risky
email from personal
social network
TARGET
Drive-by exploit is
used to install
malware on target PC
User is redirected to
a malicious website
© 2013 IBM Corporation
IBM Security Systems
12 IBM Security Systems
Using Big Data to mine for trends within e-mail
Use BigInsights to
identify phishing targets
and redirects
Build visualizations,
such as heat maps, to
view top targets
© 2013 IBM Corporation
IBM Security Systems
13 IBM Security Systems
Loading phishing data and corresponding redirects to QRadar
© 2013 IBM Corporation
IBM Security Systems
14 IBM Security Systems
―Big Value from Big Data‖ – Common use cases
Targeted & advanced
threat discovery
Insider threat
analysis
Full spectrum
fraud detection
Customer
Problem
Organizations need help in
identifying advanced threats and
zero-day attacks
Fraudulent claims, account takeovers,
and invalid transactions cause
substantial losses – and many
organizations are unaware the fraud is
being committed
As repositories of private information
expand, the cost of data loss by
insiders action grows, whether
intentional or through human error
Technical
Challenges
 Collection of high volume
network and DNS events
 Rapidly changing identifiers
 Analytics to find subtle indicators
 Integration of external
intelligence
 Collection of user, application and
network activity
 Unstructured data analysis
 Long-term baselining capabilities
 Integration with fraud workflow
 Collection of inter- and intra-
company communications
 Sentiment and linguistic analysis
 Ability to identify anomalies and
outliers
 Integration with IAM solutions
IBM
Approach
 QRadar event and flow collection
 Correlation against external
threats
 Collection of all DNS
transactions using BigInsights
 Custom analytics to identify
suspicious domain names
 Analysis of historical data to
detect infections / past intrusions
 Import BigInsights findings into
QRadar
 QRadar to collect and normalize
application and transaction data
 Anomaly detection in real time
 Real-time export to BigInsights
 Baseline historical user and account
activity
 Send insights to QRadar for real-time
fraud correlation
 Extend information flow to IBM i2 for
link analysis, visualization and
dissemination to fraud analysts
 Use QRadar to correlate real-time
system and user activity
 Analyze ordinary and privileged
users accessing sensitive data
 Collect full text email and social
activity with BigInsights
 Leverage advanced analytics to
understand unstructured content
 Share findings with existing IAM
systems—such as IBM Security
Privileged Identity Manager
© 2013 IBM Corporation
IBM Security Systems
15 IBM Security Systems
IBM’s Security Intelligence, Big Data, and Analytics portfolio
3 IBM i2
Analyst Notebook
helps analysts investigate
fraud by discovering
patterns and trends
across volumes of data
4
IBM SPSS
unified product family to help
capture, predict, discover trends,
and automatically deliver high-
volume, optimized decisions
1 IBM QRadar Security Intelligence
unified architecture for collecting, storing, analyzing and
querying log, threat, vulnerability and risk related data
2
IBM Big Data Platform
addresses the speed and flexibility required for customized
data exploration, discovery and unstructured analysis
InfoSphere Big
Data Platform
© 2013 IBM Corporation
IBM Security Systems
16 IBM Security Systems
For IBM, Security and Business Intelligence offer insightful parallels
© 2013 IBM Corporation
IBM Security Systems
17 IBM Security Systems © 2013 IBM Corporation
Extending security to
Big Data stores
© 2013 IBM Corporation
IBM Security Systems
18 IBM Security Systems
Extend real-time Data Activity Monitoring to also protect sensitive data in
data warehouses, Hadoop systems and file shares
Integration with
LDAP, IAM,
SIEM, TSM,
Remedy, …
NEW
Big Data
Environments
DATA
InfoSphere
BigInsights
© 2013 IBM Corporation
IBM Security Systems
19 IBM Security Systems
Protect data in real-time and ensure compliance in big data
environments
Big data brings big security challenges
As big data environments ingest more data, organizations will face
significant risks and threats to the repositories in which the data is kept
Big data environments help organizations:
Process, analyze and derive maximum value from these new data
formats as well as traditional structured formats in real-time
Make more informed decisions instantaneously and cost effectively
•Turn 12 terabytes of Tweets into improved product sentiment analysis
• Monitor 100’s of live video feeds from surveillance cameras to identify security threats
Introducing Hadoop Activity Monitoring
Monitor and Audit Hadoop activity in real-time to support compliance requirements and protect data
• Real time activity monitoring of HDFS and HBASE data sources
• Automated compliance controls
• Fully integrated with InfoSphere Guardium solution for database activity monitoring
• View Hadoop systems with other data sources
NEW
© 2013 IBM Corporation
IBM Security Systems
20 IBM Security Systems
Additional information
 Press Release
https://www-304.ibm.com/jct03001c/press/us/en/pressrelease/40257.wss
 Information about the presented solutions:
IBM Security Intelligence with Big Data
http://www-03.ibm.com/security/solution/intelligence-big-data/
Security Systems QRadar
http://www-142.ibm.com/software/products/us/en/subcategory/SWI60
InfoSphere BigInsights
http://www-01.ibm.com/software/data/infosphere/biginsights/
InfoSphere Guardium
http://www-01.ibm.com/software/data/guardium/secure-big-data/
© 2013 IBM Corporation
IBM Security Systems
21 IBM Security Systems
ibm.com/security
© Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

More Related Content

What's hot

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanAaron Friedman
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security IntelligenceSplunk
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Coastal Pet Products, Inc.
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attackAndreanne Clarke
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]Interset
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachCloudLock
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudTom Janetscheck
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...SparkCognition
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...Ulf Mattsson
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datosSoftware Guru
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMDenitsa Dimova
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBASplunk
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayInterset
 
Splunk for security
Splunk for securitySplunk for security
Splunk for securityGreg Hanchin
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...Interset
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issuesErnest Staats
 

What's hot (19)

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
UserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedmanUserEntityandBehaviorAnalyticsFriedman
UserEntityandBehaviorAnalyticsFriedman
 
Threat Life Cycle Management
Threat Life Cycle ManagementThreat Life Cycle Management
Threat Life Cycle Management
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
IANS Forum Charlotte: Operationalizing Big Data Security [Tech Spotlight]
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft CloudCloudbrew 2019 - Threat hunting with the Microsoft Cloud
Cloudbrew 2019 - Threat hunting with the Microsoft Cloud
 
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
Using a Cognitive Analytic Approach to Enhance Cybersecurity on Oil and Gas O...
 
How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...How the latest trends in data security can help your data protection strategy...
How the latest trends in data security can help your data protection strategy...
 
El contexto de la integración masiva de datos
El contexto de la integración masiva de datosEl contexto de la integración masiva de datos
El contexto de la integración masiva de datos
 
LogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEMLogSentinel Next-Gen SIEM
LogSentinel Next-Gen SIEM
 
Enterprise Security featuring UBA
Enterprise Security featuring UBAEnterprise Security featuring UBA
Enterprise Security featuring UBA
 
DataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the DayDataWorks 2018: How Big Data and AI Saved the Day
DataWorks 2018: How Big Data and AI Saved the Day
 
Splunk for security
Splunk for securitySplunk for security
Splunk for security
 
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
How to Operationalize Big Data Security Analytics - Technology Spotlight at I...
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 

Viewers also liked

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Andris Soroka
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
IKANOW System Architecture Guide
IKANOW System Architecture GuideIKANOW System Architecture Guide
IKANOW System Architecture GuideSholeh Gregory
 
Managing Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchManaging Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchJoe Alex
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopYahoo Developer Network
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchVic Hargrave
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
IBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewDvir Reznik
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureStefaan Van daele
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerThierry Matusiak
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteIBM Security
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017IBM Security
 

Viewers also liked (20)

Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
IKANOW System Architecture Guide
IKANOW System Architecture GuideIKANOW System Architecture Guide
IKANOW System Architecture Guide
 
Managing Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using ElasticsearchManaging Security At 1M Events a Second using Elasticsearch
Managing Security At 1M Events a Second using Elasticsearch
 
November 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with HadoopNovember 2013 HUG: Cyber Security with Hadoop
November 2013 HUG: Cyber Security with Hadoop
 
Managing Your Security Logs with Elasticsearch
Managing Your Security Logs with ElasticsearchManaging Your Security Logs with Elasticsearch
Managing Your Security Logs with Elasticsearch
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
IBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's NewIBM WebSphere Portal 6.1 Preview - What's New
IBM WebSphere Portal 6.1 Preview - What's New
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Security Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference ArchitectureSecurity Building Blocks of the IBM Cloud Computing Reference Architecture
Security Building Blocks of the IBM Cloud Computing Reference Architecture
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
IBM Security Software Solutions - One Pager
IBM Security Software Solutions - One PagerIBM Security Software Solutions - One Pager
IBM Security Software Solutions - One Pager
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 

Similar to Leverage Big Data for Security Intelligence

Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...xKinAnx
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceIBM Danmark
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Cloudera, Inc.
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxkarlhennesey
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practicesMihajlo Prerad
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunk
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...ijtsrd
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityTim Bass
 

Similar to Leverage Big Data for Security Intelligence (20)

Presentation data security solutions certified ibm business partner for ibm...
Presentation   data security solutions certified ibm business partner for ibm...Presentation   data security solutions certified ibm business partner for ibm...
Presentation data security solutions certified ibm business partner for ibm...
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
Big Data - Amplifying Security Intelligence
Big Data - Amplifying Security IntelligenceBig Data - Amplifying Security Intelligence
Big Data - Amplifying Security Intelligence
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Security Delivery Platform: Best practices
Security Delivery Platform: Best practicesSecurity Delivery Platform: Best practices
Security Delivery Platform: Best practices
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Big security for big data
Big security for big dataBig security for big data
Big security for big data
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
Study and Analysis of Big Data Security Analytics for Protecting Cloud Based ...
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 

Recently uploaded

Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSendBig4
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryWhittensFineJewelry1
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 

Recently uploaded (20)

Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Send Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.comSend Files | Sendbig.com
Send Files | Sendbig.comSend Files | Sendbig.com
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold JewelryEffective Strategies for Maximizing Your Profit When Selling Gold Jewelry
Effective Strategies for Maximizing Your Profit When Selling Gold Jewelry
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 

Leverage Big Data for Security Intelligence

  • 1. © 2013 IBM Corporation IBM Security Systems 1 IBM Security Systems © 2013 IBM Corporation Security Intelligence with Big Data IBM Security Systems Stefaan Van daele Senior Security Architect March 2013
  • 2. © 2013 IBM Corporation IBM Security Systems 2 IBM Security Systems Infiltrating a trusted partner and then loading malware onto the target’s network Creating designer malware tailored to only infect the target organization, preventing identification by security vendors Using social networking and social engineering to perform reconnaissance on spear-phishing targets, leading to compromised hosts and accounts Exploiting zero-day vulnerabilities to gain access to data, applications, systems, and endpoints Communicating over accepted channels such as port 80 to exfiltrate data from the organization Well-organized attackers and malicious insiders are successfully bypassing security defenses Designer Malware Backdoors Spear Phishing Persistence Escalating Motives and Sophistication  Organized Crime  Espionage and Hacktivists  Nation-state Actors
  • 3. © 2013 IBM Corporation IBM Security Systems 3 IBM Security Systems Customers have a growing need to identify and protect against threats by building insights from broader data sets Logs Events Alerts Configuration information System audit trails External threat intelligence feeds Network flows and anomalies Identity context Web page text Full packet and DNS captures E-mail and social activity Business process data Customer transactions Traditional Security Operations and Technology Big Data Analytics New Considerations Collection, Storage and Processing  Collection and integration  Size and speed  Enrichment and correlation Analytics and Workflow  Visualization  Unstructured analysis  Learning and prediction  Customization  Sharing and export
  • 4. © 2013 IBM Corporation IBM Security Systems 4 IBM Security Systems Big Data Warehouse Big Data Platform Analytics and Forensics Security Intelligence Platform Real-time Processing Security Operations Integrated analytics and exploration in a new architecture • Real-time data correlation • Anomaly detection • Event and flow normalization • Security context and enrichment • Distributed architecture • Long-term, multi-PB storage • Unstructured and structured • Distributed Hadoop infrastructure • Preservation of raw data • Enterprise integration • Pre-defined rules and reports • Offense scoring and prioritization • Activity and event graphing • Compliance reporting • Workflow management • Advanced visuals and interaction • Predictive and decision modeling • Ad hoc queries • Interactive visualizations • Collaborative sharing tools • Pluggable, intuitive UI Structured, analytical, repeatable Creative, exploratory, intuitive Integrated IBM Solution
  • 5. © 2013 IBM Corporation IBM Security Systems 5 IBM Security Systems What’s Next? Solving new security challenges with expanded Big Data analytics capabilities What customers are telling us: 1. Analyze a variety of non- traditional and unstructured datasets - such as email, web content, files and full packets 2. Significantly increase the volume of data stored for forensics and historic analysis 3. Visualize data in new ways, using custom queries, graphs, linguistics, maps, etc. 4. Integrate this capability with my current security operations IBM Security QRadar • Data collection and enrichment • Event correlation • Real-time analytics • Offense prioritization Advanced Threat Detection Traditional data sources Security Intelligence Platform
  • 6. © 2013 IBM Corporation IBM Security Systems 6 IBM Security Systems Real-time streaming Insights IBM Security QRadar • Hadoop-based • Enterprise-grade • Any data / volume • Data mining • Ad hoc analytics • Data collection and enrichment • Event correlation • Real-time analytics • Offense prioritization Big Data Platform Custom Analytics Traditional data sources IBM InfoSphere BigInsights Non-traditional Security Intelligence Platform How? By integrating QRadar with IBM’s Hadoop-based offering Advanced Threat Detection
  • 7. © 2013 IBM Corporation IBM Security Systems 7 IBM Security Systems QRadar leverages big data today to identify security threats IBM QRadar Security Intelligence Capabilities Customer Impact Powerful appliances with massive scale  Insights from 1000s of devices, spanning 100s of TBs Payload indexing and Google-like searching of big data  Rapid ad hoc query - search 7M+ events in <0.2 sec Broader data analysis: logs, flows, identities, vuln’s, threats  Greater insight and detection from richer context Layer 7 network flow collection and analytics  More accurate anomaly detection and easier forensics Advanced threat visualization and impact analysis  Attack path visualization and device / interface mapping Enrichment with X-Force® intelligence and external feeds  Increased accuracy of detecting the latest threats High- Volume Events, Flows and Context
  • 8. © 2013 IBM Corporation IBM Security Systems 8 IBM Security Systems Example QRadar uses cases Behavior monitoring and flow analytics Activity and data access monitoring Stealthy malware detection Irrefutable Botnet Communication Layer 7 flow data shows botnet command and control instructions Improved Breach Detection 360-degree visibility helps distinguish true breaches from benign activity, in real-time Network Traffic Doesn’t Lie Attackers can stop logging and erase their tracks, but can’t cut off the network (flow data)
  • 9. © 2013 IBM Corporation IBM Security Systems 9 IBM Security Systems 9 IBM InfoSphere BigInsights – A flexible, enterprise-class solution for processing large volumes of data EnterpriseValue Core Hadoop BigInsights Basic Edition BigInsights Enterprise Edition Free download with web support Limit to <= 10 TB of data (Optional: 24x7 paid support Fixed Term License) Professional Services Offerings QuickStart, Bootcamp, Education, Custom Development Enterprise-grade features Tiered terabyte-based pricing Easy installation and programming • Analytics tooling / visualization • Recoverability security • Administration tooling • Development tooling • Flexible storage • High availability
  • 10. © 2013 IBM Corporation IBM Security Systems 10 IBM Security Systems Web and Email Proxy Customer example – User profiling based on multiple sources NetFlow Optional Relational Store Unstructured Data 5 1 1 10 9 8 6 2 Hadoop Store Big Data Warehouse Big Data Analytics and Forensics Data Sources Real-time Processing Security Operations 3 7 Suspicious User(s) Internet 4 1. NetFlow and logs sent to QRadar 2. Event and flow processing 3. Correlation against external feeds 4. Real-time user alerts to SOC 5. Unstructured data to BigInsights 6. Enriched events and flows sent to BigInsights 7. Spreadsheet UI for business analysts (BigSheets) 8. Post-processed data storage 9. i2 Analyst Notebook: link-based visuals and analytics 10. Update of QRadar real-time rule sets
  • 11. © 2013 IBM Corporation IBM Security Systems 11 IBM Security Systems Example Use Case: Spear-phishing analysis ATTACKER User receives risky email from personal social network TARGET Drive-by exploit is used to install malware on target PC User is redirected to a malicious website
  • 12. © 2013 IBM Corporation IBM Security Systems 12 IBM Security Systems Using Big Data to mine for trends within e-mail Use BigInsights to identify phishing targets and redirects Build visualizations, such as heat maps, to view top targets
  • 13. © 2013 IBM Corporation IBM Security Systems 13 IBM Security Systems Loading phishing data and corresponding redirects to QRadar
  • 14. © 2013 IBM Corporation IBM Security Systems 14 IBM Security Systems ―Big Value from Big Data‖ – Common use cases Targeted & advanced threat discovery Insider threat analysis Full spectrum fraud detection Customer Problem Organizations need help in identifying advanced threats and zero-day attacks Fraudulent claims, account takeovers, and invalid transactions cause substantial losses – and many organizations are unaware the fraud is being committed As repositories of private information expand, the cost of data loss by insiders action grows, whether intentional or through human error Technical Challenges  Collection of high volume network and DNS events  Rapidly changing identifiers  Analytics to find subtle indicators  Integration of external intelligence  Collection of user, application and network activity  Unstructured data analysis  Long-term baselining capabilities  Integration with fraud workflow  Collection of inter- and intra- company communications  Sentiment and linguistic analysis  Ability to identify anomalies and outliers  Integration with IAM solutions IBM Approach  QRadar event and flow collection  Correlation against external threats  Collection of all DNS transactions using BigInsights  Custom analytics to identify suspicious domain names  Analysis of historical data to detect infections / past intrusions  Import BigInsights findings into QRadar  QRadar to collect and normalize application and transaction data  Anomaly detection in real time  Real-time export to BigInsights  Baseline historical user and account activity  Send insights to QRadar for real-time fraud correlation  Extend information flow to IBM i2 for link analysis, visualization and dissemination to fraud analysts  Use QRadar to correlate real-time system and user activity  Analyze ordinary and privileged users accessing sensitive data  Collect full text email and social activity with BigInsights  Leverage advanced analytics to understand unstructured content  Share findings with existing IAM systems—such as IBM Security Privileged Identity Manager
  • 15. © 2013 IBM Corporation IBM Security Systems 15 IBM Security Systems IBM’s Security Intelligence, Big Data, and Analytics portfolio 3 IBM i2 Analyst Notebook helps analysts investigate fraud by discovering patterns and trends across volumes of data 4 IBM SPSS unified product family to help capture, predict, discover trends, and automatically deliver high- volume, optimized decisions 1 IBM QRadar Security Intelligence unified architecture for collecting, storing, analyzing and querying log, threat, vulnerability and risk related data 2 IBM Big Data Platform addresses the speed and flexibility required for customized data exploration, discovery and unstructured analysis InfoSphere Big Data Platform
  • 16. © 2013 IBM Corporation IBM Security Systems 16 IBM Security Systems For IBM, Security and Business Intelligence offer insightful parallels
  • 17. © 2013 IBM Corporation IBM Security Systems 17 IBM Security Systems © 2013 IBM Corporation Extending security to Big Data stores
  • 18. © 2013 IBM Corporation IBM Security Systems 18 IBM Security Systems Extend real-time Data Activity Monitoring to also protect sensitive data in data warehouses, Hadoop systems and file shares Integration with LDAP, IAM, SIEM, TSM, Remedy, … NEW Big Data Environments DATA InfoSphere BigInsights
  • 19. © 2013 IBM Corporation IBM Security Systems 19 IBM Security Systems Protect data in real-time and ensure compliance in big data environments Big data brings big security challenges As big data environments ingest more data, organizations will face significant risks and threats to the repositories in which the data is kept Big data environments help organizations: Process, analyze and derive maximum value from these new data formats as well as traditional structured formats in real-time Make more informed decisions instantaneously and cost effectively •Turn 12 terabytes of Tweets into improved product sentiment analysis • Monitor 100’s of live video feeds from surveillance cameras to identify security threats Introducing Hadoop Activity Monitoring Monitor and Audit Hadoop activity in real-time to support compliance requirements and protect data • Real time activity monitoring of HDFS and HBASE data sources • Automated compliance controls • Fully integrated with InfoSphere Guardium solution for database activity monitoring • View Hadoop systems with other data sources NEW
  • 20. © 2013 IBM Corporation IBM Security Systems 20 IBM Security Systems Additional information  Press Release https://www-304.ibm.com/jct03001c/press/us/en/pressrelease/40257.wss  Information about the presented solutions: IBM Security Intelligence with Big Data http://www-03.ibm.com/security/solution/intelligence-big-data/ Security Systems QRadar http://www-142.ibm.com/software/products/us/en/subcategory/SWI60 InfoSphere BigInsights http://www-01.ibm.com/software/data/infosphere/biginsights/ InfoSphere Guardium http://www-01.ibm.com/software/data/guardium/secure-big-data/
  • 21. © 2013 IBM Corporation IBM Security Systems 21 IBM Security Systems ibm.com/security © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.